Search
Skip to Search Results
Filter
Subject / Keyword
Collections
Author / Creator / Contributor
Year
Languages
Item type
-
12/18/2014
While privacy issues in children's mobile applications are becoming increasingly sophisticated, the permissions in these applications are undergoing development without proper security implementation. Mobile applications with excessive privacy features can cause serious data leakages and other...
-
2008-01-01
Operationally Critical Threat Asset and Vulnerability Evaluation (OCTAVE) and SysTrust are two information security methodologies used to audit and review information security practices. OCTAVE is a comprehensive methodology to assess and analyze information security risks based on IT asset type....
1 - 2 of 2